A technique for cryptographic strength selection for at least one
application is provided, in accordance with a framework for providing
cryptographic support of the at least one application. Data encryption is
performed at a first cryptographic strength when the at least one
application is privileged to perform encryption at a first cryptographic
strength. Data encryption is performed at a second cryptographic strength
when the at least one application is not privileged to perform encryption
at the first cryptographic strength. The first cryptographic strength is
stronger than the second cryptographic strength.